Vulnerabilites related to bestwebsoft - error_log_viewer
CVE-2021-24966 (GCVE-0-2021-24966)
Vulnerability from cvelistv5
Published
2022-03-14 14:41
Modified
2024-08-03 19:49
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-73 - External Control of File Name or Path
Summary
The Error Log Viewer WordPress plugin through 1.1.1 does not validate the path of the log file to clear, allowing high privilege users to clear arbitrary files on the web server, including those outside of the blog folder
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Unknown | Error Log Viewer by BestWebSoft |
Version: 1.1.1 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:49:14.380Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wpscan.com/vulnerability/166a4f88-4f0c-4bf4-b624-5e6a02e21fa0" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Error Log Viewer by BestWebSoft", "vendor": "Unknown", "versions": [ { "lessThanOrEqual": "1.1.1", "status": "affected", "version": "1.1.1", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Ceylan Bozogullarindan" } ], "descriptions": [ { "lang": "en", "value": "The Error Log Viewer WordPress plugin through 1.1.1 does not validate the path of the log file to clear, allowing high privilege users to clear arbitrary files on the web server, including those outside of the blog folder" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-73", "description": "CWE-73 External Control of File Name or Path", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-14T14:41:06", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wpscan.com/vulnerability/166a4f88-4f0c-4bf4-b624-5e6a02e21fa0" } ], "source": { "discovery": "EXTERNAL" }, "title": "Error Log Viewer Plugin \u003c= 1.1.1 - Admin+ Arbitrary File Clearing", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2021-24966", "STATE": "PUBLIC", "TITLE": "Error Log Viewer Plugin \u003c= 1.1.1 - Admin+ Arbitrary File Clearing" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Error Log Viewer by BestWebSoft", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "1.1.1", "version_value": "1.1.1" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "Ceylan Bozogullarindan" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Error Log Viewer WordPress plugin through 1.1.1 does not validate the path of the log file to clear, allowing high privilege users to clear arbitrary files on the web server, including those outside of the blog folder" } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-73 External Control of File Name or Path" } ] } ] }, "references": { "reference_data": [ { "name": "https://wpscan.com/vulnerability/166a4f88-4f0c-4bf4-b624-5e6a02e21fa0", "refsource": "MISC", "url": "https://wpscan.com/vulnerability/166a4f88-4f0c-4bf4-b624-5e6a02e21fa0" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2021-24966", "datePublished": "2022-03-14T14:41:06", "dateReserved": "2021-01-14T00:00:00", "dateUpdated": "2024-08-03T19:49:14.380Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-18562 (GCVE-0-2017-18562)
Vulnerability from cvelistv5
Published
2019-08-21 18:06
Modified
2024-08-05 21:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The error-log-viewer plugin before 1.0.6 for WordPress has multiple XSS issues.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:28:55.255Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wordpress.org/plugins/error-log-viewer/#developers" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The error-log-viewer plugin before 1.0.6 for WordPress has multiple XSS issues." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-21T18:06:27", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wordpress.org/plugins/error-log-viewer/#developers" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-18562", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The error-log-viewer plugin before 1.0.6 for WordPress has multiple XSS issues." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://wordpress.org/plugins/error-log-viewer/#developers", "refsource": "MISC", "url": "https://wordpress.org/plugins/error-log-viewer/#developers" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-18562", "datePublished": "2019-08-21T18:06:27", "dateReserved": "2019-08-20T00:00:00", "dateUpdated": "2024-08-05T21:28:55.255Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-6821 (GCVE-0-2023-6821)
Vulnerability from cvelistv5
Published
2024-03-18 19:05
Modified
2025-03-27 14:43
Severity ?
VLAI Severity ?
EPSS score ?
Summary
The Error Log Viewer by BestWebSoft WordPress plugin before 1.1.3 is affected by a Directory Listing issue, allowing users to read and download PHP logs without authorization
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Unknown | Error Log Viewer by BestWebSoft |
Version: 0 ≤ |
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-6821", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-03-21T18:18:28.348123Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-27T14:43:18.746Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T08:42:07.513Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "exploit", "vdb-entry", "technical-description", "x_transferred" ], "url": "https://wpscan.com/vulnerability/6b1a998d-c97c-4305-b12a-69e29408ebd9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://wordpress.org/plugins", "defaultStatus": "unaffected", "product": "Error Log Viewer by BestWebSoft", "vendor": "Unknown", "versions": [ { "lessThan": "1.1.3", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Dmitrii Ignatyev" }, { "lang": "en", "type": "coordinator", "value": "WPScan" } ], "descriptions": [ { "lang": "en", "value": "The Error Log Viewer by BestWebSoft WordPress plugin before 1.1.3 is affected by a Directory Listing issue, allowing users to read and download PHP logs without authorization" } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-548 Exposure of Information Through Directory Listing", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-30T07:48:40.648Z", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "exploit", "vdb-entry", "technical-description" ], "url": "https://wpscan.com/vulnerability/6b1a998d-c97c-4305-b12a-69e29408ebd9/" } ], "source": { "discovery": "EXTERNAL" }, "title": "Error Log Viewer \u003c 1.1.3 - Directory Listing to Sensitive Data Exposure", "x_generator": { "engine": "WPScan CVE Generator" } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2023-6821", "datePublished": "2024-03-18T19:05:50.023Z", "dateReserved": "2023-12-14T17:22:55.631Z", "dateUpdated": "2025-03-27T14:43:18.746Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-2171 (GCVE-0-2017-2171)
Vulnerability from cvelistv5
Published
2017-05-22 16:00
Modified
2024-08-05 13:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Cross-site scripting
Summary
Cross-site scripting vulnerability in Captcha prior to version 4.3.0, Car Rental prior to version 1.0.5, Contact Form Multi prior to version 1.2.1, Contact Form prior to version 4.0.6, Contact Form to DB prior to version 1.5.7, Custom Admin Page prior to version 0.1.2, Custom Fields Search prior to version 1.3.2, Custom Search prior to version 1.36, Donate prior to version 2.1.1, Email Queue prior to version 1.1.2, Error Log Viewer prior to version 1.0.6, Facebook Button prior to version 2.54, Featured Posts prior to version 1.0.1, Gallery Categories prior to version 1.0.9, Gallery prior to version 4.5.0, Google +1 prior to version 1.3.4, Google AdSense prior to version 1.44, Google Analytics prior to version 1.7.1, Google Captcha (reCAPTCHA) prior to version 1.28, Google Maps prior to version 1.3.6, Google Shortlink prior to version 1.5.3, Google Sitemap prior to version 3.0.8, Htaccess prior to version 1.7.6, Job Board prior to version 1.1.3, Latest Posts prior to version 0.3, Limit Attempts prior to version 1.1.8, LinkedIn prior to version 1.0.5, Multilanguage prior to version 1.2.2, PDF & Print prior to version 1.9.4, Pagination prior to version 1.0.7, Pinterest prior to version 1.0.5, Popular Posts prior to version 1.0.5, Portfolio prior to version 2.4, Post to CSV prior to version 1.3.1, Profile Extra prior to version 1.0.7. PromoBar prior to version 1.1.1, Quotes and Tips prior to version 1.32, Re-attacher prior to version 1.0.9, Realty prior to version 1.1.0, Relevant - Related Posts prior to version 1.2.0, Sender prior to version 1.2.1, SMTP prior to version 1.1.0, Social Buttons Pack prior to version 1.1.1, Subscriber prior to version 1.3.5, Testimonials prior to version 0.1.9, Timesheet prior to version 0.1.5, Twitter Button prior to version 2.55, User Role prior to version 1.5.6, Updater prior to version 1.35, Visitors Online prior to version 1.0.0, and Zendesk Help Center prior to version 1.0.5 allows remote attackers to inject arbitrary web script or HTML via the function to display the BestWebSoft menu.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | BestWebSoft | Captcha |
Version: prior to version 4.3.0 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T13:48:03.789Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "JVNDB-2017-000094", "tags": [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2017-000094" }, { "name": "JVN#24834813", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN24834813/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Captcha", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 4.3.0" } ] }, { "product": "Car Rental", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.0.5" } ] }, { "product": "Contact Form Multi", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.2.1" } ] }, { "product": "Contact Form", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 4.0.6" } ] }, { "product": "Contact Form to DB", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.5.7" } ] }, { "product": "Custom Admin Page", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 0.1.2" } ] }, { "product": "Custom Fields Search", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.3.2" } ] }, { "product": "Custom Search", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.36" } ] }, { "product": "Donate", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 2.1.1" } ] }, { "product": "Email Queue", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.1.2" } ] }, { "product": "Error Log Viewer", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.0.6" } ] }, { "product": "Facebook Button", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 2.54" } ] }, { "product": "Featured Posts", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.0.1" } ] }, { "product": "Gallery Categories", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.0.9" } ] }, { "product": "Gallery", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 4.5.0" } ] }, { "product": "Google +1", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.3.4" } ] }, { "product": "Google AdSense", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.44" } ] }, { "product": "Google Analytics", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.7.1" } ] }, { "product": "Google Captcha (reCAPTCHA)", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.28" } ] }, { "product": "Google Maps", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.3.6" } ] }, { "product": "Google Shortlink", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.5.3" } ] }, { "product": "Google Sitemap", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 3.0.8" } ] }, { "product": "Htaccess", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.7.6" } ] }, { "product": "Job Board", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.1.3" } ] }, { "product": "Latest Posts", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 0.3" } ] }, { "product": "Limit Attempts", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.1.8" } ] }, { "product": "LinkedIn", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.0.5" } ] }, { "product": "Multilanguage", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.2.2" } ] }, { "product": "PDF \u0026 Print", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.9.4" } ] }, { "product": "Pagination", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.0.7" } ] }, { "product": "Pinterest", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.0.5" } ] }, { "product": "Popular Posts", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.0.5" } ] }, { "product": "Portfolio", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 2.4" } ] }, { "product": "Post to CSV", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.3.1" } ] }, { "product": "Profile Extra", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.0.7" } ] }, { "product": "PromoBar", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.1.1" } ] }, { "product": "Quotes and Tips", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.32" } ] }, { "product": "Re-attacher", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.0.9" } ] }, { "product": "Realty", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.1.0" } ] }, { "product": "Relevant - Related Posts", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.2.0" } ] }, { "product": "Sender", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.2.1" } ] }, { "product": "SMTP", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.1.0" } ] }, { "product": "Social Buttons Pack", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.1.1" } ] }, { "product": "Subscriber", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.3.5" } ] }, { "product": "Testimonials", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 0.1.9" } ] }, { "product": "Timesheet", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 0.1.5" } ] }, { "product": "Twitter Button", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 2.55" } ] }, { "product": "User Role", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.5.6" } ] }, { "product": "Updater", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.35" } ] }, { "product": "Visitors Online", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.0.0" } ] }, { "product": "Zendesk Help Center", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.0.5" } ] } ], "datePublic": "2017-05-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability in Captcha prior to version 4.3.0, Car Rental prior to version 1.0.5, Contact Form Multi prior to version 1.2.1, Contact Form prior to version 4.0.6, Contact Form to DB prior to version 1.5.7, Custom Admin Page prior to version 0.1.2, Custom Fields Search prior to version 1.3.2, Custom Search prior to version 1.36, Donate prior to version 2.1.1, Email Queue prior to version 1.1.2, Error Log Viewer prior to version 1.0.6, Facebook Button prior to version 2.54, Featured Posts prior to version 1.0.1, Gallery Categories prior to version 1.0.9, Gallery prior to version 4.5.0, Google +1 prior to version 1.3.4, Google AdSense prior to version 1.44, Google Analytics prior to version 1.7.1, Google Captcha (reCAPTCHA) prior to version 1.28, Google Maps prior to version 1.3.6, Google Shortlink prior to version 1.5.3, Google Sitemap prior to version 3.0.8, Htaccess prior to version 1.7.6, Job Board prior to version 1.1.3, Latest Posts prior to version 0.3, Limit Attempts prior to version 1.1.8, LinkedIn prior to version 1.0.5, Multilanguage prior to version 1.2.2, PDF \u0026 Print prior to version 1.9.4, Pagination prior to version 1.0.7, Pinterest prior to version 1.0.5, Popular Posts prior to version 1.0.5, Portfolio prior to version 2.4, Post to CSV prior to version 1.3.1, Profile Extra prior to version 1.0.7. PromoBar prior to version 1.1.1, Quotes and Tips prior to version 1.32, Re-attacher prior to version 1.0.9, Realty prior to version 1.1.0, Relevant - Related Posts prior to version 1.2.0, Sender prior to version 1.2.1, SMTP prior to version 1.1.0, Social Buttons Pack prior to version 1.1.1, Subscriber prior to version 1.3.5, Testimonials prior to version 0.1.9, Timesheet prior to version 0.1.5, Twitter Button prior to version 2.55, User Role prior to version 1.5.6, Updater prior to version 1.35, Visitors Online prior to version 1.0.0, and Zendesk Help Center prior to version 1.0.5 allows remote attackers to inject arbitrary web script or HTML via the function to display the BestWebSoft menu." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-05-22T15:57:01", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "name": "JVNDB-2017-000094", "tags": [ "third-party-advisory", "x_refsource_JVNDB" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2017-000094" }, { "name": "JVN#24834813", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "https://jvn.jp/en/jp/JVN24834813/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2017-2171", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Captcha", "version": { "version_data": [ { "version_value": "prior to version 4.3.0" } ] } }, { "product_name": "Car Rental", "version": { "version_data": [ { "version_value": "prior to version 1.0.5" } ] } }, { "product_name": "Contact Form Multi", "version": { "version_data": [ { "version_value": "prior to version 1.2.1" } ] } }, { "product_name": "Contact Form", "version": { "version_data": [ { "version_value": "prior to version 4.0.6" } ] } }, { "product_name": "Contact Form to DB", "version": { "version_data": [ { "version_value": "prior to version 1.5.7" } ] } }, { "product_name": "Custom Admin Page", "version": { "version_data": [ { "version_value": "prior to version 0.1.2" } ] } }, { "product_name": "Custom Fields Search", "version": { "version_data": [ { "version_value": "prior to version 1.3.2" } ] } }, { "product_name": "Custom Search", "version": { "version_data": [ { "version_value": "prior to version 1.36" } ] } }, { "product_name": "Donate", "version": { "version_data": [ { "version_value": "prior to version 2.1.1" } ] } }, { "product_name": "Email Queue", "version": { "version_data": [ { "version_value": "prior to version 1.1.2" } ] } }, { "product_name": "Error Log Viewer", "version": { "version_data": [ { "version_value": "prior to version 1.0.6" } ] } }, { "product_name": "Facebook Button", "version": { "version_data": [ { "version_value": "prior to version 2.54" } ] } }, { "product_name": "Featured Posts", "version": { "version_data": [ { "version_value": "prior to version 1.0.1" } ] } }, { "product_name": "Gallery Categories", "version": { "version_data": [ { "version_value": "prior to version 1.0.9" } ] } }, { "product_name": "Gallery", "version": { "version_data": [ { "version_value": "prior to version 4.5.0" } ] } }, { "product_name": "Google +1", "version": { "version_data": [ { "version_value": "prior to version 1.3.4" } ] } }, { "product_name": "Google AdSense", "version": { "version_data": [ { "version_value": "prior to version 1.44" } ] } }, { "product_name": "Google Analytics", "version": { "version_data": [ { "version_value": "prior to version 1.7.1" } ] } }, { "product_name": "Google Captcha (reCAPTCHA)", "version": { "version_data": [ { "version_value": "prior to version 1.28" } ] } }, { "product_name": "Google Maps", "version": { "version_data": [ { "version_value": "prior to version 1.3.6" } ] } }, { "product_name": "Google Shortlink", "version": { "version_data": [ { "version_value": "prior to version 1.5.3" } ] } }, { "product_name": "Google Sitemap", "version": { "version_data": [ { "version_value": "prior to version 3.0.8" } ] } }, { "product_name": "Htaccess", "version": { "version_data": [ { "version_value": "prior to version 1.7.6" } ] } }, { "product_name": "Job Board", "version": { "version_data": [ { "version_value": "prior to version 1.1.3" } ] } }, { "product_name": "Latest Posts", "version": { "version_data": [ { "version_value": "prior to version 0.3" } ] } }, { "product_name": "Limit Attempts", "version": { "version_data": [ { "version_value": "prior to version 1.1.8" } ] } }, { "product_name": "LinkedIn", "version": { "version_data": [ { "version_value": "prior to version 1.0.5" } ] } }, { "product_name": "Multilanguage", "version": { "version_data": [ { "version_value": "prior to version 1.2.2" } ] } }, { "product_name": "PDF \u0026 Print", "version": { "version_data": [ { "version_value": "prior to version 1.9.4" } ] } }, { "product_name": "Pagination", "version": { "version_data": [ { "version_value": "prior to version 1.0.7" } ] } }, { "product_name": "Pinterest", "version": { "version_data": [ { "version_value": "prior to version 1.0.5" } ] } }, { "product_name": "Popular Posts", "version": { "version_data": [ { "version_value": "prior to version 1.0.5" } ] } }, { "product_name": "Portfolio", "version": { "version_data": [ { "version_value": "prior to version 2.4" } ] } }, { "product_name": "Post to CSV", "version": { "version_data": [ { "version_value": "prior to version 1.3.1" } ] } }, { "product_name": "Profile Extra", "version": { "version_data": [ { "version_value": "prior to version 1.0.7" } ] } }, { "product_name": "PromoBar", "version": { "version_data": [ { "version_value": "prior to version 1.1.1" } ] } }, { "product_name": "Quotes and Tips", "version": { "version_data": [ { "version_value": "prior to version 1.32" } ] } }, { "product_name": "Re-attacher", "version": { "version_data": [ { "version_value": "prior to version 1.0.9" } ] } }, { "product_name": "Realty", "version": { "version_data": [ { "version_value": "prior to version 1.1.0" } ] } }, { "product_name": "Relevant - Related Posts", "version": { "version_data": [ { "version_value": "prior to version 1.2.0" } ] } }, { "product_name": "Sender", "version": { "version_data": [ { "version_value": "prior to version 1.2.1" } ] } }, { "product_name": "SMTP", "version": { "version_data": [ { "version_value": "prior to version 1.1.0" } ] } }, { "product_name": "Social Buttons Pack", "version": { "version_data": [ { "version_value": "prior to version 1.1.1" } ] } }, { "product_name": "Subscriber", "version": { "version_data": [ { "version_value": "prior to version 1.3.5" } ] } }, { "product_name": "Testimonials", "version": { "version_data": [ { "version_value": "prior to version 0.1.9" } ] } }, { "product_name": "Timesheet", "version": { "version_data": [ { "version_value": "prior to version 0.1.5" } ] } }, { "product_name": "Twitter Button", "version": { "version_data": [ { "version_value": "prior to version 2.55" } ] } }, { "product_name": "User Role", "version": { "version_data": [ { "version_value": "prior to version 1.5.6" } ] } }, { "product_name": "Updater", "version": { "version_data": [ { "version_value": "prior to version 1.35" } ] } }, { "product_name": "Visitors Online", "version": { "version_data": [ { "version_value": "prior to version 1.0.0" } ] } }, { "product_name": "Zendesk Help Center", "version": { "version_data": [ { "version_value": "prior to version 1.0.5" } ] } } ] }, "vendor_name": "BestWebSoft" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting vulnerability in Captcha prior to version 4.3.0, Car Rental prior to version 1.0.5, Contact Form Multi prior to version 1.2.1, Contact Form prior to version 4.0.6, Contact Form to DB prior to version 1.5.7, Custom Admin Page prior to version 0.1.2, Custom Fields Search prior to version 1.3.2, Custom Search prior to version 1.36, Donate prior to version 2.1.1, Email Queue prior to version 1.1.2, Error Log Viewer prior to version 1.0.6, Facebook Button prior to version 2.54, Featured Posts prior to version 1.0.1, Gallery Categories prior to version 1.0.9, Gallery prior to version 4.5.0, Google +1 prior to version 1.3.4, Google AdSense prior to version 1.44, Google Analytics prior to version 1.7.1, Google Captcha (reCAPTCHA) prior to version 1.28, Google Maps prior to version 1.3.6, Google Shortlink prior to version 1.5.3, Google Sitemap prior to version 3.0.8, Htaccess prior to version 1.7.6, Job Board prior to version 1.1.3, Latest Posts prior to version 0.3, Limit Attempts prior to version 1.1.8, LinkedIn prior to version 1.0.5, Multilanguage prior to version 1.2.2, PDF \u0026 Print prior to version 1.9.4, Pagination prior to version 1.0.7, Pinterest prior to version 1.0.5, Popular Posts prior to version 1.0.5, Portfolio prior to version 2.4, Post to CSV prior to version 1.3.1, Profile Extra prior to version 1.0.7. PromoBar prior to version 1.1.1, Quotes and Tips prior to version 1.32, Re-attacher prior to version 1.0.9, Realty prior to version 1.1.0, Relevant - Related Posts prior to version 1.2.0, Sender prior to version 1.2.1, SMTP prior to version 1.1.0, Social Buttons Pack prior to version 1.1.1, Subscriber prior to version 1.3.5, Testimonials prior to version 0.1.9, Timesheet prior to version 0.1.5, Twitter Button prior to version 2.55, User Role prior to version 1.5.6, Updater prior to version 1.35, Visitors Online prior to version 1.0.0, and Zendesk Help Center prior to version 1.0.5 allows remote attackers to inject arbitrary web script or HTML via the function to display the BestWebSoft menu." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-site scripting" } ] } ] }, "references": { "reference_data": [ { "name": "JVNDB-2017-000094", "refsource": "JVNDB", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2017-000094" }, { "name": "JVN#24834813", "refsource": "JVN", "url": "https://jvn.jp/en/jp/JVN24834813/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2017-2171", "datePublished": "2017-05-22T16:00:00", "dateReserved": "2016-12-01T00:00:00", "dateUpdated": "2024-08-05T13:48:03.789Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-24761 (GCVE-0-2021-24761)
Vulnerability from cvelistv5
Published
2022-02-01 12:21
Modified
2024-08-03 19:42
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
The Error Log Viewer WordPress plugin before 1.1.2 does not perform nonce check when deleting a log file and does not have path traversal prevention, which could allow attackers to make a logged in admin delete arbitrary text files on the web server.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Unknown | Error Log Viewer by BestWebSoft |
Version: 1.1.2 < 1.1.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:42:16.647Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wpscan.com/vulnerability/c14e1ba6-fc00-4150-b541-0d6740fee4d2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Error Log Viewer by BestWebSoft", "vendor": "Unknown", "versions": [ { "lessThan": "1.1.2", "status": "affected", "version": "1.1.2", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "apple502j" } ], "descriptions": [ { "lang": "en", "value": "The Error Log Viewer WordPress plugin before 1.1.2 does not perform nonce check when deleting a log file and does not have path traversal prevention, which could allow attackers to make a logged in admin delete arbitrary text files on the web server." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352 Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-21T18:55:34", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wpscan.com/vulnerability/c14e1ba6-fc00-4150-b541-0d6740fee4d2" } ], "source": { "discovery": "EXTERNAL" }, "title": "Error Log Viewer \u003c 1.1.2 - Arbitrary Text File Deletion via CSRF", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2021-24761", "STATE": "PUBLIC", "TITLE": "Error Log Viewer \u003c 1.1.2 - Arbitrary Text File Deletion via CSRF" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Error Log Viewer by BestWebSoft", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "1.1.2", "version_value": "1.1.2" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "apple502j" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Error Log Viewer WordPress plugin before 1.1.2 does not perform nonce check when deleting a log file and does not have path traversal prevention, which could allow attackers to make a logged in admin delete arbitrary text files on the web server." } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-352 Cross-Site Request Forgery (CSRF)" } ] }, { "description": [ { "lang": "eng", "value": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://wpscan.com/vulnerability/c14e1ba6-fc00-4150-b541-0d6740fee4d2", "refsource": "MISC", "url": "https://wpscan.com/vulnerability/c14e1ba6-fc00-4150-b541-0d6740fee4d2" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2021-24761", "datePublished": "2022-02-01T12:21:22", "dateReserved": "2021-01-14T00:00:00", "dateUpdated": "2024-08-03T19:42:16.647Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2022-03-14 15:15
Modified
2024-11-21 05:54
Severity ?
Summary
The Error Log Viewer WordPress plugin through 1.1.1 does not validate the path of the log file to clear, allowing high privilege users to clear arbitrary files on the web server, including those outside of the blog folder
References
▶ | URL | Tags | |
---|---|---|---|
contact@wpscan.com | https://wpscan.com/vulnerability/166a4f88-4f0c-4bf4-b624-5e6a02e21fa0 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://wpscan.com/vulnerability/166a4f88-4f0c-4bf4-b624-5e6a02e21fa0 | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
bestwebsoft | error_log_viewer | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bestwebsoft:error_log_viewer:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "D80E2DCB-ABCD-4F30-BA9F-FF80E0D659B7", "versionEndIncluding": "1.1.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Error Log Viewer WordPress plugin through 1.1.1 does not validate the path of the log file to clear, allowing high privilege users to clear arbitrary files on the web server, including those outside of the blog folder" }, { "lang": "es", "value": "El plugin Error Log Viewer de WordPress versiones hasta 1.1.1, no comprueba la ruta del archivo de registro que va a ser borrada, permitiendo a usuarios con altos privilegios borrar archivos arbitrarios en el servidor web, incluidos los que est\u00e1n fuera de la carpeta del blog" } ], "id": "CVE-2021-24966", "lastModified": "2024-11-21T05:54:06.073", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-03-14T15:15:08.760", "references": [ { "source": "contact@wpscan.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://wpscan.com/vulnerability/166a4f88-4f0c-4bf4-b624-5e6a02e21fa0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://wpscan.com/vulnerability/166a4f88-4f0c-4bf4-b624-5e6a02e21fa0" } ], "sourceIdentifier": "contact@wpscan.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-73" } ], "source": "contact@wpscan.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-02-01 13:15
Modified
2024-11-21 05:53
Severity ?
Summary
The Error Log Viewer WordPress plugin before 1.1.2 does not perform nonce check when deleting a log file and does not have path traversal prevention, which could allow attackers to make a logged in admin delete arbitrary text files on the web server.
References
▶ | URL | Tags | |
---|---|---|---|
contact@wpscan.com | https://wpscan.com/vulnerability/c14e1ba6-fc00-4150-b541-0d6740fee4d2 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://wpscan.com/vulnerability/c14e1ba6-fc00-4150-b541-0d6740fee4d2 | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
bestwebsoft | error_log_viewer | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bestwebsoft:error_log_viewer:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "C689076B-0CA0-4D25-93FA-BBF44381C768", "versionEndExcluding": "1.1.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Error Log Viewer WordPress plugin before 1.1.2 does not perform nonce check when deleting a log file and does not have path traversal prevention, which could allow attackers to make a logged in admin delete arbitrary text files on the web server." }, { "lang": "es", "value": "El plugin de WordPress Error Log Viewer anterior a la versi\u00f3n 1.1.2 no realiza la comprobaci\u00f3n de nonce al eliminar un archivo de registro y no tiene prevenci\u00f3n de path traversal, lo que podr\u00eda permitir a los atacantes hacer que un administrador conectado elimine archivos de texto arbitrarios en el servidor web" } ], "id": "CVE-2021-24761", "lastModified": "2024-11-21T05:53:42.783", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-01T13:15:08.337", "references": [ { "source": "contact@wpscan.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://wpscan.com/vulnerability/c14e1ba6-fc00-4150-b541-0d6740fee4d2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://wpscan.com/vulnerability/c14e1ba6-fc00-4150-b541-0d6740fee4d2" } ], "sourceIdentifier": "contact@wpscan.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" }, { "lang": "en", "value": "CWE-352" } ], "source": "contact@wpscan.com", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-22" }, { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2024-03-18 19:15
Modified
2025-03-27 15:15
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
The Error Log Viewer by BestWebSoft WordPress plugin before 1.1.3 is affected by a Directory Listing issue, allowing users to read and download PHP logs without authorization
References
▶ | URL | Tags | |
---|---|---|---|
contact@wpscan.com | https://wpscan.com/vulnerability/6b1a998d-c97c-4305-b12a-69e29408ebd9/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://wpscan.com/vulnerability/6b1a998d-c97c-4305-b12a-69e29408ebd9/ | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
bestwebsoft | error_log_viewer | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bestwebsoft:error_log_viewer:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "68F9E14D-6AB0-4552-BC74-94FE9D61FF21", "versionEndExcluding": "1.1.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Error Log Viewer by BestWebSoft WordPress plugin before 1.1.3 is affected by a Directory Listing issue, allowing users to read and download PHP logs without authorization" }, { "lang": "es", "value": "El complemento Error Log Viewer de BestWebSoft WordPress anterior a 1.1.3 contiene una vulnerabilidad que le permite leer y descargar registros PHP sin autorizaci\u00f3n" } ], "id": "CVE-2023-6821", "lastModified": "2025-03-27T15:15:48.000", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-03-18T19:15:06.097", "references": [ { "source": "contact@wpscan.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://wpscan.com/vulnerability/6b1a998d-c97c-4305-b12a-69e29408ebd9/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://wpscan.com/vulnerability/6b1a998d-c97c-4305-b12a-69e29408ebd9/" } ], "sourceIdentifier": "contact@wpscan.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-862" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-08-21 19:15
Modified
2024-11-21 03:20
Severity ?
Summary
The error-log-viewer plugin before 1.0.6 for WordPress has multiple XSS issues.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
bestwebsoft | error_log_viewer | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bestwebsoft:error_log_viewer:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "9F8886DD-38B1-46BE-BDA5-C79E84B69BCF", "versionEndExcluding": "1.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The error-log-viewer plugin before 1.0.6 for WordPress has multiple XSS issues." }, { "lang": "es", "value": "El plugin de error-log-viewer anterior a la versi\u00f3n 1.0.6 para WordPress tiene m\u00faltiples problemas de XSS." } ], "id": "CVE-2017-18562", "lastModified": "2024-11-21T03:20:24.473", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-08-21T19:15:12.827", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://wordpress.org/plugins/error-log-viewer/#developers" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://wordpress.org/plugins/error-log-viewer/#developers" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-05-22 16:29
Modified
2025-04-20 01:37
Severity ?
Summary
Cross-site scripting vulnerability in Captcha prior to version 4.3.0, Car Rental prior to version 1.0.5, Contact Form Multi prior to version 1.2.1, Contact Form prior to version 4.0.6, Contact Form to DB prior to version 1.5.7, Custom Admin Page prior to version 0.1.2, Custom Fields Search prior to version 1.3.2, Custom Search prior to version 1.36, Donate prior to version 2.1.1, Email Queue prior to version 1.1.2, Error Log Viewer prior to version 1.0.6, Facebook Button prior to version 2.54, Featured Posts prior to version 1.0.1, Gallery Categories prior to version 1.0.9, Gallery prior to version 4.5.0, Google +1 prior to version 1.3.4, Google AdSense prior to version 1.44, Google Analytics prior to version 1.7.1, Google Captcha (reCAPTCHA) prior to version 1.28, Google Maps prior to version 1.3.6, Google Shortlink prior to version 1.5.3, Google Sitemap prior to version 3.0.8, Htaccess prior to version 1.7.6, Job Board prior to version 1.1.3, Latest Posts prior to version 0.3, Limit Attempts prior to version 1.1.8, LinkedIn prior to version 1.0.5, Multilanguage prior to version 1.2.2, PDF & Print prior to version 1.9.4, Pagination prior to version 1.0.7, Pinterest prior to version 1.0.5, Popular Posts prior to version 1.0.5, Portfolio prior to version 2.4, Post to CSV prior to version 1.3.1, Profile Extra prior to version 1.0.7. PromoBar prior to version 1.1.1, Quotes and Tips prior to version 1.32, Re-attacher prior to version 1.0.9, Realty prior to version 1.1.0, Relevant - Related Posts prior to version 1.2.0, Sender prior to version 1.2.1, SMTP prior to version 1.1.0, Social Buttons Pack prior to version 1.1.1, Subscriber prior to version 1.3.5, Testimonials prior to version 0.1.9, Timesheet prior to version 0.1.5, Twitter Button prior to version 2.55, User Role prior to version 1.5.6, Updater prior to version 1.35, Visitors Online prior to version 1.0.0, and Zendesk Help Center prior to version 1.0.5 allows remote attackers to inject arbitrary web script or HTML via the function to display the BestWebSoft menu.
References
▶ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | http://jvndb.jvn.jp/jvndb/JVNDB-2017-000094 | Third Party Advisory, VDB Entry | |
vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN24834813/index.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://jvndb.jvn.jp/jvndb/JVNDB-2017-000094 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/jp/JVN24834813/index.html | Third Party Advisory, VDB Entry |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bestwebsoft:captcha:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "90F44502-FB47-4A8C-85E0-1D2F7CEB4F8F", "versionEndIncluding": "4.2.9", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:car_rental:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "7FD9118E-F65C-4F96-A03D-87EF15FE4DB8", "versionEndIncluding": "1.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:contact_form:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "AA683363-7D2C-40FC-AFC1-8BB0D7E3AF60", "versionEndIncluding": "4.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:contact_form_multi:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "2C300FBE-4C10-402E-9DFD-9C2A0E241684", "versionEndIncluding": "1.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:contact_form_to_db:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "E74A735C-9771-42FE-91CF-2EE118BE5754", "versionEndIncluding": "1.5.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:custom_admin_page:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "567A9DFD-5848-4A84-8787-CC21DEDF3A20", "versionEndIncluding": "0.1.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:custom_fields_search:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "A2B55BB7-BAA3-4A64-86B0-D0B1B0AE1790", "versionEndIncluding": "1.3.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:custom_search:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "417CA792-0359-484F-873D-CC1B1367EA76", "versionEndIncluding": "1.35", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:donate:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "DFD8E82F-C24A-4038-9B08-CEEF5CBBC42B", "versionEndIncluding": "2.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:email_queue:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "89F8B416-6BFD-48D7-B93E-CAB63DE9186B", "versionEndIncluding": "1.1.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:error_log_viewer:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "2A209B67-5AF3-43B3-882A-EB19FACDF92F", "versionEndIncluding": "1.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:facebook_button:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "654AE23F-C9D4-4C7E-B224-7F3C6928BA26", "versionEndIncluding": "2.53", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:featured_posts:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "988E8170-1CBF-4ADC-996C-AABFB01BA651", "versionEndIncluding": "1.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:gallery:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "2B96D453-8969-450C-9C65-AB3F7AEEBB4E", "versionEndIncluding": "4.4.9", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:gallery_categories:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "22A425FD-B64C-4838-B444-E360EC3CC165", "versionEndIncluding": "1.0.8", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:google_\\+1:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "7254F701-8040-4333-9176-485C933B91C2", "versionEndIncluding": "1.3.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:google_adsense:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "C2E35767-7306-4629-8D52-25473261C6D1", "versionEndIncluding": "1.43", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:google_analytics:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "8EB86D06-FE0E-4F27-BD0C-DF8F14683C82", "versionEndIncluding": "1.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:google_captcha_\\(recaptcha\\):*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "41305158-20F3-4981-A225-DA6098D29787", "versionEndIncluding": "1.27", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:google_maps:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "8D441016-C8FA-46EE-A5C9-1BC59C0300BC", "versionEndIncluding": "1.3.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:google_shortlink:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "E9D74A48-AA12-4144-9E58-629B0453F2E5", "versionEndIncluding": "1.5.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:google_sitemap:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "76055B18-196C-40E7-9ED0-08757BF02294", "versionEndIncluding": "3.0.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:htaccess:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "9AD12F58-D0AE-4C81-A462-77B773AC6C01", "versionEndIncluding": "1.7.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:job_board:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "1E7291C6-8894-445E-8D1F-F7E0B81B7413", "versionEndIncluding": "1.1.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:latest_posts:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "2E923F7E-6E06-4D71-A6BD-DD3F5C9ACE09", "versionEndIncluding": "0.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:limit_attempts:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "4523ADEB-335E-4F85-BB9C-F9067FE7704E", "versionEndIncluding": "1.1.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:linkedin:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "7C68F2B6-7703-4D1A-9F65-84AFA2A1399C", "versionEndIncluding": "1.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:multilanguage:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "C18F489C-D0D5-4E52-8676-A9AA54E0F4D8", "versionEndIncluding": "1.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:pagination:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "9ACAF0C2-2F33-428A-82C3-033008BA53E5", "versionEndIncluding": "1.0.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:pdf_\\\u0026_print:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "15CACB57-172A-4D72-945B-2E558C4306A1", "versionEndIncluding": "1.9.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:pinterest:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "128A8B29-44E3-48E2-9B35-647CFDB4B2CF", "versionEndIncluding": "1.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:popular_posts:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "E5142C57-41B0-4C34-8D67-1B0E74E85823", "versionEndIncluding": "1.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:portfolio:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "4BB616C1-FB02-4C36-8404-2B51174E0643", "versionEndIncluding": "2.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:post_to_csv:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "C7BD7BC4-26C8-44CC-BA11-FBD08C60BDDB", "versionEndIncluding": "1.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:profile_extra:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "A9B6AF6B-7C61-4710-8E20-5260B8BB8587", "versionEndIncluding": "1.0.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:promobar:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "66EBAC9C-9BDF-4CE0-A6DF-F86B60749EBC", "versionEndIncluding": "1.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:quotes_and_tips:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "A155BC6E-80DC-4B1F-91BC-91F46EFDB7B0", "versionEndIncluding": "1.31", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:re-attacher:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "D5244EC0-B74E-4621-8A35-1303A66FBB77", "versionEndIncluding": "1.0.8", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:realty:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "7B3D5561-7C8A-4F10-A94C-3B107E859C9F", "versionEndIncluding": "1.0.9", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:relevant_-_related_posts:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "13C5ADFE-9E5F-4B6D-868C-1E5561BCA735", "versionEndIncluding": "1.1.9", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:sender:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "E2FEB44F-6295-47DA-A8E1-A98C91D7B3D4", "versionEndIncluding": "1.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:smtp:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "C31637E1-2B26-41D3-9C48-30909192C4C1", "versionEndIncluding": "1.0.9", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:social_buttons_pack:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "3F00CBC2-5171-47ED-8E4D-B5F5AE6F2D5D", "versionEndIncluding": "1.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:subscriber:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "7780A47F-094A-4F9C-AF4E-9C77CDF0ABDE", "versionEndIncluding": "1.3.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:testimonials:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "9936ACD0-1E2E-4E14-B83E-E4967DA9E546", "versionEndIncluding": "0.1.8", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:timesheet:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "7AF2B2E4-0563-4FB3-83AA-4A219EB41036", "versionEndIncluding": "0.1.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:twitter_button:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "F0CF502E-87F7-4B64-B123-EF610ABAC15D", "versionEndIncluding": "2.54", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:updater:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "1E817AF1-87E3-43A6-86F6-69C585790F47", "versionEndIncluding": "1.34", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:user_role:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "97AD540F-5775-4F84-AAA5-175C947BB34E", "versionEndIncluding": "1.5.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:visitors_online:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "61A05396-59CD-475A-A4D5-009B591C6BA4", "versionEndIncluding": "0.9", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:zendesk_help_center:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "6F4D196B-0578-44BA-A2C3-10F1C4D395F8", "versionEndIncluding": "1.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability in Captcha prior to version 4.3.0, Car Rental prior to version 1.0.5, Contact Form Multi prior to version 1.2.1, Contact Form prior to version 4.0.6, Contact Form to DB prior to version 1.5.7, Custom Admin Page prior to version 0.1.2, Custom Fields Search prior to version 1.3.2, Custom Search prior to version 1.36, Donate prior to version 2.1.1, Email Queue prior to version 1.1.2, Error Log Viewer prior to version 1.0.6, Facebook Button prior to version 2.54, Featured Posts prior to version 1.0.1, Gallery Categories prior to version 1.0.9, Gallery prior to version 4.5.0, Google +1 prior to version 1.3.4, Google AdSense prior to version 1.44, Google Analytics prior to version 1.7.1, Google Captcha (reCAPTCHA) prior to version 1.28, Google Maps prior to version 1.3.6, Google Shortlink prior to version 1.5.3, Google Sitemap prior to version 3.0.8, Htaccess prior to version 1.7.6, Job Board prior to version 1.1.3, Latest Posts prior to version 0.3, Limit Attempts prior to version 1.1.8, LinkedIn prior to version 1.0.5, Multilanguage prior to version 1.2.2, PDF \u0026 Print prior to version 1.9.4, Pagination prior to version 1.0.7, Pinterest prior to version 1.0.5, Popular Posts prior to version 1.0.5, Portfolio prior to version 2.4, Post to CSV prior to version 1.3.1, Profile Extra prior to version 1.0.7. PromoBar prior to version 1.1.1, Quotes and Tips prior to version 1.32, Re-attacher prior to version 1.0.9, Realty prior to version 1.1.0, Relevant - Related Posts prior to version 1.2.0, Sender prior to version 1.2.1, SMTP prior to version 1.1.0, Social Buttons Pack prior to version 1.1.1, Subscriber prior to version 1.3.5, Testimonials prior to version 0.1.9, Timesheet prior to version 0.1.5, Twitter Button prior to version 2.55, User Role prior to version 1.5.6, Updater prior to version 1.35, Visitors Online prior to version 1.0.0, and Zendesk Help Center prior to version 1.0.5 allows remote attackers to inject arbitrary web script or HTML via the function to display the BestWebSoft menu." }, { "lang": "es", "value": "Una Vulnerabilidad de tipo cross-site-scripting en Captcha anterior a versi\u00f3n 4.3.0, Car Rental anterior a versi\u00f3n 1.0.5, Contact Form Multi anterior a versi\u00f3n 1.2.1, Contact Form anterior a versi\u00f3n 4.0.6, Contact Form to DB anterior a versi\u00f3n 1.5.7, Custom Admin Page anterior a versi\u00f3n 0.1.2, Custom Fields Search anterior a versi\u00f3n 1.3.2, Custom Search anterior a versi\u00f3n 1.36, Donate anterior a versi\u00f3n 2.1.1, Email Queue anterior a versi\u00f3n 1.1.2, Error Log Viewer anterior a versi\u00f3n 1.0.6, Facebook Button anterior a versi\u00f3n 2.54, Featured Posts anterior a versi\u00f3n 1.0.1, Gallery Categories anterior a versi\u00f3n 1.0.9, Gallery anterior a versi\u00f3n 4.5.0, Google +1 anterior a versi\u00f3n 1.3.4, Google AdSense anterior a versi\u00f3n 1.44, Google Analytics anterior a versi\u00f3n 1.7.1, Google Captcha (reCAPTCHA) anterior a versi\u00f3n 1.28, Google Maps anterior a versi\u00f3n 1.3.6, Google Shortlink anterior a versi\u00f3n 1.5.3, Google Sitemap anterior a versi\u00f3n 3.0.8, Htaccess anterior a versi\u00f3n 1.7.6, Job Board anterior a versi\u00f3n 1.1.3, Latest Posts anterior a versi\u00f3n 0.3, Limit Attempts anterior a versi\u00f3n 1.1.8, LinkedIn anterior a versi\u00f3n 1.0.5, Multilanguage anterior a versi\u00f3n 1.2.2, PDF \u0026 Print anterior a versi\u00f3n 1.9.4, Pagination anterior a versi\u00f3n 1.0.7, Pinterest anterior a versi\u00f3n 1.0.5, Popular Posts anteriores a versi\u00f3n 1.0.5, Portfolio anterior a la versi\u00f3n 2.4, Post to CSV anterior a versi\u00f3n 1.3.1, Profile Extra anterior a versi\u00f3n 1.0.7. PromoBar anterior a versi\u00f3n 1.1.1, Quotes and Tips anterior a versi\u00f3n 1.32, Re-attacher anterior a versi\u00f3n 1.0.9, Realty anterior a versi\u00f3n 1.1.0, Relevant - Related Posts anterior a versi\u00f3n 1.2.0, Sender anterior a versi\u00f3n 1.2.1, SMTP anterior a versi\u00f3n 1.1.0, Social Buttons Pack anterior a versi\u00f3n 1.1.1, Subscriber anterior a versi\u00f3n 1.3.5, Testimonials anteriores a versi\u00f3n 0.1.9, Timesheet anterior a versi\u00f3n 0.1.5, Twitter Button anterior a versi\u00f3n 2.55, User Role anterior a versi\u00f3n 1.5.6, Updater anterior a versi\u00f3n 1.35, Visitors Online anterior a versi\u00f3n 1.0.0, y Zendesk Help Center anterior a versi\u00f3n 1.0.5, permite a los atacantes remotos inyectar script web o HTML arbitrario por medio de la funci\u00f3n para mostrar el men\u00fa BestWebSoft." } ], "id": "CVE-2017-2171", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-05-22T16:29:00.747", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2017-000094" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://jvn.jp/en/jp/JVN24834813/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2017-000094" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://jvn.jp/en/jp/JVN24834813/index.html" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" }, { "lang": "en", "value": "CWE-91" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }